SlideShare una empresa de Scribd logo
1 de 15
Cyber Bullying
                          By
              Abhishek Desai
DIGICorp Information Systems
What is it?
   "Cyberbullying involves the use of information
    and communication technologies such as e-
    mail, cell phone and pager text messages,
    instant messaging, defamatory personal Web
    sites, and defamatory online personal polling
    Web sites, to support deliberate, repeated,
    and hostile behaviour by an individual or
    group, that is intended to harm others." - Bill
    Belsey
What forms does cyber
bullying take?
   Email
   SMS
   MMS
   IM (Instant Messaging)
   Blogs
   Personal websites
   Personal polling sites
Cyber bullying and Law
   Cyber bullying is a CRIMINAL ACT
   It is a CRIME to communicate repeatedly with
    someone if it causes them to fear for their own
    safety or safety of others
   It is also a crime to publish “defamatory libel” –
    writing something which is intended to insult
    someone
   It violates the human rights act.
   Personally I believe it is an act of “COWARDICE”
What can be done?
   Awareness and education
       www.cyberbullying.ca

   You should never send message to others
    when you are angry

   You should never open a message from
    someone you don’t know
What can be done? Contd          ..



   If you encounter something on internet which
    doesn’t feel right don’t open it

   You don’t have to be always on the internet

   Schools should update the Internet and
    computer access policies as soon as possible
If you are a victim…
   DO NOT keep it to yourself, You are not
    ALONE.
   Inform an ADULT you know and trust.
   Inform you Internet Service Provider or
    Mobile service provider
   Inform your LOCAL POLICE
   Do not reply to message from cyber bullies
   Do not erase or delete the message from
    cyber bullies
What kind of information can
be saved?
   Save following from the email
       E-mail address
       Date and time received
       Copies of relevant emails with full email headers

   Save following from chat room
       Date and time of chat
       Name and URL of the chat room
       Nickname of the offending person
       Email address if available
       Screenshot of chat room
Report Cyber bullying Email
   Report cyber bullying email to your ISPs.

   Emails can be traced easily using different
    available software

   If somebody has stolen your account contact
    support team of that mail site.
Report chat room cyber
bullying
   Highlight the chatter’s name
   Use the ignore button to stop all
    conversations
   Take a screen shot of the abuse
   Note the time and date of the chat
   Report to chat room operator or service
    operator
   Speak to parent or a teacher
Its not your fault
   You should know that it is not your fault if bad
    people are there in the world
   You should not be ashamed of telling it to
    adults or teachers
   People are not anonymous on the internet.
    With the right information they can be easily
    traced and punished by local police or
    authorities.
Protect yourself
   Never arrange a meeting with someone you
    don’t know

   If you have to, go with your parents.

   You may need to delete your current email
    accounts, cell phone etc and setup a news
    ones.
Examples of cyber-bullying
   One example of cyber-bullying was the Star Wars kid whose
    classmates uploaded video footage of him posing as the Star
    Wars character Darth Maul onto Kazaa in 2003. The footage was
    downloaded extensively and modified causing the subject
    extensive embarrassment resulting in psychiatric treatment.

   13 year old Vermont boy Ryan Halligan committed suicide, as a
    result of cyber-bullying:
     "Ryan Halligan hanged himself after prolonged bullying at school
       and at home through the Internet. He was repeatedly taunted
       online. Due to the continued bullying, Ryan latched on to the idea
       of killing himself as vengeance against those who had hurt him."
       [6]
Questions?
Thank You

Más contenido relacionado

La actualidad más candente

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingCoachElrod
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parentsdamarissepulveda
 
My protection plan
My protection planMy protection plan
My protection planShakena12
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaAlexander Berta
 
Cyberstalking
CyberstalkingCyberstalking
CyberstalkingTrevschic
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1sabrinacotta
 
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...Kim Wesson
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingNuraySmat
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingQazi Anwar
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
The Hazards Of Cyberbullying
The Hazards Of CyberbullyingThe Hazards Of Cyberbullying
The Hazards Of CyberbullyingIC
 

La actualidad más candente (19)

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parents
 
My protection plan
My protection planMy protection plan
My protection plan
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
 
Internet safety
Internet safety Internet safety
Internet safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
 
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
The Hazards Of Cyberbullying
The Hazards Of CyberbullyingThe Hazards Of Cyberbullying
The Hazards Of Cyberbullying
 

Similar a Abhishek cyber bullying

Similar a Abhishek cyber bullying (20)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying!!!
Cyberbullying!!! Cyberbullying!!!
Cyberbullying!!!
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
Cyberbullying power pot student copy
Cyberbullying  power pot student copyCyberbullying  power pot student copy
Cyberbullying power pot student copy
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberbullying power ppt student copy
Cyberbullying  power ppt  student copyCyberbullying  power ppt  student copy
Cyberbullying power ppt student copy
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 

Más de parulata

The philosophy of timetabling
The philosophy of timetablingThe philosophy of timetabling
The philosophy of timetablingparulata
 
School leadership
School leadershipSchool leadership
School leadershipparulata
 
Riverside Eduretreat
Riverside Eduretreat Riverside Eduretreat
Riverside Eduretreat parulata
 
Riverside training program ppt
Riverside training program pptRiverside training program ppt
Riverside training program pptparulata
 
Riverside framework
Riverside frameworkRiverside framework
Riverside frameworkparulata
 
Phonics ( New)
Phonics ( New)Phonics ( New)
Phonics ( New)parulata
 
Multiple Intelligence theory
Multiple Intelligence theory Multiple Intelligence theory
Multiple Intelligence theory parulata
 
Differentiated Instruction
Differentiated InstructionDifferentiated Instruction
Differentiated Instructionparulata
 
Creative classroom workshop
Creative classroom workshopCreative classroom workshop
Creative classroom workshopparulata
 
Classroom mgmt (mod)
Classroom mgmt (mod)Classroom mgmt (mod)
Classroom mgmt (mod)parulata
 
Adult learning model
Adult learning modelAdult learning model
Adult learning modelparulata
 
Interest center final
Interest center finalInterest center final
Interest center finalparulata
 
Funderstanding
FunderstandingFunderstanding
Funderstandingparulata
 
Assembly performances
Assembly performancesAssembly performances
Assembly performancesparulata
 
Adolescence
AdolescenceAdolescence
Adolescenceparulata
 
Teachers poem
Teachers poemTeachers poem
Teachers poemparulata
 
Sciencequiz08ppt
Sciencequiz08pptSciencequiz08ppt
Sciencequiz08pptparulata
 
Yadu computer internals final-2
Yadu  computer internals final-2Yadu  computer internals final-2
Yadu computer internals final-2parulata
 
Yadu computer internals final 1
Yadu  computer internals final 1Yadu  computer internals final 1
Yadu computer internals final 1parulata
 

Más de parulata (20)

The philosophy of timetabling
The philosophy of timetablingThe philosophy of timetabling
The philosophy of timetabling
 
School leadership
School leadershipSchool leadership
School leadership
 
Riverside Eduretreat
Riverside Eduretreat Riverside Eduretreat
Riverside Eduretreat
 
Riverside training program ppt
Riverside training program pptRiverside training program ppt
Riverside training program ppt
 
Riverside framework
Riverside frameworkRiverside framework
Riverside framework
 
Planner
PlannerPlanner
Planner
 
Phonics ( New)
Phonics ( New)Phonics ( New)
Phonics ( New)
 
Multiple Intelligence theory
Multiple Intelligence theory Multiple Intelligence theory
Multiple Intelligence theory
 
Differentiated Instruction
Differentiated InstructionDifferentiated Instruction
Differentiated Instruction
 
Creative classroom workshop
Creative classroom workshopCreative classroom workshop
Creative classroom workshop
 
Classroom mgmt (mod)
Classroom mgmt (mod)Classroom mgmt (mod)
Classroom mgmt (mod)
 
Adult learning model
Adult learning modelAdult learning model
Adult learning model
 
Interest center final
Interest center finalInterest center final
Interest center final
 
Funderstanding
FunderstandingFunderstanding
Funderstanding
 
Assembly performances
Assembly performancesAssembly performances
Assembly performances
 
Adolescence
AdolescenceAdolescence
Adolescence
 
Teachers poem
Teachers poemTeachers poem
Teachers poem
 
Sciencequiz08ppt
Sciencequiz08pptSciencequiz08ppt
Sciencequiz08ppt
 
Yadu computer internals final-2
Yadu  computer internals final-2Yadu  computer internals final-2
Yadu computer internals final-2
 
Yadu computer internals final 1
Yadu  computer internals final 1Yadu  computer internals final 1
Yadu computer internals final 1
 

Último

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Último (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Abhishek cyber bullying

  • 1. Cyber Bullying By Abhishek Desai DIGICorp Information Systems
  • 2. What is it?  "Cyberbullying involves the use of information and communication technologies such as e- mail, cell phone and pager text messages, instant messaging, defamatory personal Web sites, and defamatory online personal polling Web sites, to support deliberate, repeated, and hostile behaviour by an individual or group, that is intended to harm others." - Bill Belsey
  • 3. What forms does cyber bullying take?  Email  SMS  MMS  IM (Instant Messaging)  Blogs  Personal websites  Personal polling sites
  • 4. Cyber bullying and Law  Cyber bullying is a CRIMINAL ACT  It is a CRIME to communicate repeatedly with someone if it causes them to fear for their own safety or safety of others  It is also a crime to publish “defamatory libel” – writing something which is intended to insult someone  It violates the human rights act.  Personally I believe it is an act of “COWARDICE”
  • 5. What can be done?  Awareness and education  www.cyberbullying.ca  You should never send message to others when you are angry  You should never open a message from someone you don’t know
  • 6. What can be done? Contd ..  If you encounter something on internet which doesn’t feel right don’t open it  You don’t have to be always on the internet  Schools should update the Internet and computer access policies as soon as possible
  • 7. If you are a victim…  DO NOT keep it to yourself, You are not ALONE.  Inform an ADULT you know and trust.  Inform you Internet Service Provider or Mobile service provider  Inform your LOCAL POLICE  Do not reply to message from cyber bullies  Do not erase or delete the message from cyber bullies
  • 8. What kind of information can be saved?  Save following from the email  E-mail address  Date and time received  Copies of relevant emails with full email headers  Save following from chat room  Date and time of chat  Name and URL of the chat room  Nickname of the offending person  Email address if available  Screenshot of chat room
  • 9. Report Cyber bullying Email  Report cyber bullying email to your ISPs.  Emails can be traced easily using different available software  If somebody has stolen your account contact support team of that mail site.
  • 10. Report chat room cyber bullying  Highlight the chatter’s name  Use the ignore button to stop all conversations  Take a screen shot of the abuse  Note the time and date of the chat  Report to chat room operator or service operator  Speak to parent or a teacher
  • 11. Its not your fault  You should know that it is not your fault if bad people are there in the world  You should not be ashamed of telling it to adults or teachers  People are not anonymous on the internet. With the right information they can be easily traced and punished by local police or authorities.
  • 12. Protect yourself  Never arrange a meeting with someone you don’t know  If you have to, go with your parents.  You may need to delete your current email accounts, cell phone etc and setup a news ones.
  • 13. Examples of cyber-bullying  One example of cyber-bullying was the Star Wars kid whose classmates uploaded video footage of him posing as the Star Wars character Darth Maul onto Kazaa in 2003. The footage was downloaded extensively and modified causing the subject extensive embarrassment resulting in psychiatric treatment.  13 year old Vermont boy Ryan Halligan committed suicide, as a result of cyber-bullying:  "Ryan Halligan hanged himself after prolonged bullying at school and at home through the Internet. He was repeatedly taunted online. Due to the continued bullying, Ryan latched on to the idea of killing himself as vengeance against those who had hurt him." [6]